Search

Seminars

ISO 27005 Information Security Risk Management (ISRM)



Introduction:


Organizations of all types are concerned by threats that could compromise their information security. These threats may take any form from identity theft; risks of doing business on-line all the way to theft of equipment or documents which could have a direct impact on businesses, with possible financial loss or damage, loss of essential network services etc.. This course will help you to understand the information security risks you face while implementing and operating an information security management system. This course allows the participants to familiarize themselves with the fundamentals of risk management related to information security using the standard ISO/IEC 27005:2011 as a reference framework. Participants will see different parts of a risk management program and the implementation stages of an optimal risk assessment. It should be noted that this course fits perfectly into the framework of a process of implementation of ISO 27001.

 

Risk assessment and management provides the foundation for internal controls management, as well as business continuity and disaster recovery management. ISO 27005 provides guidelines for information security risk management, it supports the general concepts specified in ISO 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. In this course, participants develop the competence to master the basic risk management elements related to all assets of relevance for information security using the ISO 27005 standard as a reference framework. The objective of this course is to provide delegates with the specific guidance and advice to support the implementation of requirements defined in ISO/IEC 27001 that relate to risk management processes and associated activities. The course will provide delegates with a risk management framework for development and operation. This course enables participants to learn about the best practices in risk management based on ISO/IEC 27005, as well as understanding how different parts of a risk management program and the implementation stages of an optimal risk assessment are conducted. The course will feature:

 

  • Description of information security risk assessment
  • Information security risk management process overview
  • Information security risk assessment approaches
  • Asset identification and valuation
  • Impact assessment
  • Risk identification
  • Risk analysis
  • Threats identification and ranking
  • Vulnerabilities methods for vulnerability assessment
  • Risk estimation
  • Risk evaluation
  • Basic risk criteria
  • Risk evaluation criteria
  • Risk impact criteria
  • Risk acceptance criteria
  • Risk treatment
  • Risk reduction
  • Risk retention
  • Risk avoidance
  • Risk transfer
  • Monitoring and review of risk factors
  • Risk management monitoring, reviewing and improving

Course Objectives:


By the end of this course, delegates will be able to:

 

  • Understand the basics of the implementation, management and maintenance of an ongoing risk management program
  • Introduce the concepts, approaches, standards, methods and techniques allowing an effective management of risk
  • Interpret the requirements of ISO 27001 on information security risk management
  • Understand the relationship between the information security risk management, the security controls and the compliance with the requirements of different stakeholders of an organization
  • Understand the role and importance of risk management in an organization
  • Know why risk management is the core competence of information security management
  • Understand the concepts, approaches, methods and techniques allowing an effective management of risk according to ISO 27005
  • Interpret the requirements of ISO 27001 on information security risk management
  • Understand the relationship between the information security risk management, the security controls and the compliance with the requirements of different stakeholders of an organization
  • Acquire the competence to effectively advise organizations on the best practices in information security risk management
  • Understand risk management approaches in accordance with ISO/IEC 27005
  • Know the concepts, approaches, standards, methods and techniques allowing effective risk management based on ISO/IEC 27005

Who Should Attend?


Managers, Team Leaders, Line Managers, Superintendents, OE Champions, Quality and Project Managers, Supervisors, Executives, Internal and External Auditors, Members of IT Team, Health & Safety Managers, Risk Managers, Business Process Owners, Business Finance Managers, Business Risk Managers, Regulatory Compliance Managers, Project Managers, Continuity, Risk, Quality, IT and Environmental Managers, Anyone involved in the system development, implementation and maintenance, Regulatory Affairs Managers, Consultants, Anyone involved in  implement an EMS implementation and maintenance, Technicians involved in operations related to an ISMS, Anyone who is involved in ISO standards, Staff organizations implementing or seeking to comply with ISO 27001 or involved in a risk management program, IT Professionals wanting to gain a comprehensive knowledge of risk management within an organization, Staff involved in the implementation of the ISO/IEC 27005 standard

Course Outline:


  • Why ISO 27005?
  • Scope  of ISO 27005
  • Introduction to the ISO/IEC 27000 family of standards
  • Introduction to management systems and the process approach
  • Fundamental principles of risk management
  • Concepts and definitions related to risk management
  • Standards, frameworks and methodologies in risk management
  • General requirements: presentation of the clauses 4 to 12 of the ISO/IEC 27005
  • Implementation phases of the ISO/IEC 27005 framework
  • Continual improvement of risk management
  • Conducting an ISO/IEC 27005 certification audit
  • Implement a risk management program
  • Risk identification and risk analysis
  • Risk evaluation and risk treatment
  • Acceptance of risk and management of residual risks
  • Communicating, monitoring and controlling risk
  • Risk management standards, frameworks and methodologies
  • Implementation of an information security risk management program
  • Understanding an organization and its context
  • ISMS overview 
  • Major differences in ISMS approaches
  • Recommended approach 
  • Points to consider
  • Introduction to the landscape of risk 
  • Asset landscape 
  • Threat landscape 
  • Controls landscape
  • Loss (impact) landscape 
  • Vulnerability landscape  
  • What information is necessary for risk analysis? 
  • Define the context for information risk management
  • Risk identification and risk analysis
  • Introduction to risk assessment methodologies
  • Risk assessment with a quantitative method
  • Determine the appropriate information risk treatment plan 
  • Develop an information security risk communication plan
  • Describe the information security risk monitoring and review plan

COURSE LOCATIONS

Code From To City Fee
ISO04 02 Feb 2020 06 Feb 2020 Dubai US$ 4200 Book
ISO04 06 Apr 2020 10 Apr 2020 Kuala Lumpur US$ 4500 Book
ISO04 08 Jun 2020 12 Jun 2020 London US$ 5000 Book
ISO04 10 Aug 2020 14 Aug 2020 Bali US$ 5500 Book
ISO04 12 Oct 2020 16 Oct 2020 New Delhi US$ 6000 Book
ISO04 14 Dec 2020 18 Dec 2020 Beijing US$ 5500 Book


DUBAI OFFICE

Ittihad Deira Building,
Al Ittihad Rd, Deira
Dubai,
UAE

info@petrogas-training.com

USA OFFICE

642 E14 Street,
10009-13 Manhattan,
New York (NY)
USA

info@petrogas-training.com

EGYPT OFFICE

52 General Kamal Hejab Street,
Suez Bridge,
Cairo,
Egypt

info@petrogas-training.com
 

COURSE CERTIFICATE

Certificate of Completion will be provided to the candidate(s) who successfully attend and complete the course. Training hours attendance percentage of 75% is required.


TRAINING HOURS

Standard course hours: 8:30 A.M. to 3:30 P.M. Informal discussions: 4:30 P.M. to 5:30 P.M.


TRAINING METHODOLOGY

We use a blend of interactive and hands-on methods, active participation, a variety of instructional techniques, dynamic presentations, individual and group exercises, in depth discussion, DVD’s, role-plays, case studies, examples. All of the information, competencies, knowledge and skills acquired within our training programs, are 100% transferrable to the participants’ workplace.


ASSESSMENT & EVALUATION

Pre-Test and Post-Test Assessment are applied on 5-day and 10-day programs. Also, post course evaluation and candidate’s evaluation are applied to add another level of quality measurement. Candidates’ feedback is highly appreciated to elevate the training service quality.


ORGANIZATIONAL IMPACT

A- Have staff trained in the latest training and development approaches

B- Support nationalization and talent management initiatives

C- Have properly trained and informed people who will be able to add value

D- Gain relevant technical knowledge, skills and competencies


PERSONAL IMPACT

A- Develop job related skills

B- Develop personal skills in subject matter

C- Have a record of your growth and learning results

D- Bring proof of your progress back to your organization

F- Become competent, effective and productive

G- Be more able to make sound decisions

H- Be more effective in day to day work by mastering job-related processes

I- Create and develop competency to perform job well


FREQUENT NOMINATIONS SCHEME

A- 10% discount after 05 candidates’ registration.

B- 15% discount after 10 candidates’ registration.    

C- 20% discount after 20 candidates’ registration.

D- 25% discount after 25 candidates’ registration.

E- 30% discount after 30 candidates’ registration

F- Higher discount rates will be offered based on work volume with different clients.  


SEVERAL NOMINATIONS ON THE SAME COURSE SCHEME

A- One extra free seat is offered on 4 candidates on the same course and dates.

B- Two extra free seats are offered on 6 candidates on the same course and dates.

C- Three extra free seats are offered on 8 candidates on the same course and dates.

D- Four extra free seats are offered on 10 candidates on the same course and dates.

E- Five extra free seats are offered on 12 candidates on the same course and dates.


REGISTRATION POLICY

Nominations to our public courses are to be processed by the client’s Training and/or HR departments. A refund will be issued back to the client in the event of course cancellation or seat unavailability. A confirmation will be issued to the relevant department official(s). 


CANCELLATION POLICY

If a confirmed registration is cancelled less than 5 working days prior to the course start date, a substitute participant may be nominated to attend the same course or a 20% cancellation charge is applied. In case of a no-show, a 100% fee will be charged.


PAYMENT POLICY

Payment is due upon receiving the course confirmation, invoice and/or proforma invoice. However; the fee due can be wire transferred to our bank account directly after course completion. Our bank details are illustrated on the confirmation, invoice and proforma invoice, as well. The above documents can be communicated electronically, i.e., in a soft copy or/and in hard copy based on customer’s request.


COPYRIGHT

© 2017. Material published by PETROGAS shown here is copyrighted. © 2017. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing in any medium, transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.